PowerShell for Pentesters is an introduction to using PowerShell for pentesters. A series of videos that break down all the techniques that security analysts can apply and understand how operation of Powershell.
Provided scripts for easy installation functionalof Active Directory, however, no instructions are given regarding the installation of virtual machines. A guide provided in this repo covers the basics of setting up your network in Virtualbox.
The process is similar in VMWare Workstation and Workstation Pro.
Finally you will need Hashcat, which is available at https://hashcat.net/hashcat/. You can also download it via Kali Linux if you have it installed.
Installation
git clone https://github.com/dievus/PowerShellForPentesters.git
Specifications
- User, group, and workstation enumeration
- Domain enumeration
- Downloading with PowerShell
- GROUP Policy Enumeration
- ACL Enumeration
- PowerShell Remoting
- PowerView and other popular offensive PowerShell scripts
- Mimikatz exploitation
Use
- Invoke-ForestDeploy.ps1
The . \ Invoke-ADGenerator.ps1
This will install the Windows Active Directory Domain Services toolkit and create the real domain. Follow the instructions on the screen, noting the name of the domain used as this will be needed later.
- Invoke-ADGenerator.ps1
The . \ Invoke-ADGenerator.ps1
This will create the appropriate users, groups, permissions and configurations required for the course.
- NameGen.ps1
The . \ NameGen.ps1
executeScript -ComputerName Workstation -01
This runs on the Workstation-01 machine created to properly name the workstation. Be sure to use -ComputerName flag and specify Workstation -01.
You can find the course on YouTube by clicking here.